General

  • Target

    fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118

  • Size

    169KB

  • Sample

    241218-pyc4eayrgs

  • MD5

    fb94b0a4ac7d7fff50a121024061222a

  • SHA1

    be03b847836f1ca452bafaac0c872ef34eabbb80

  • SHA256

    b6c63a936e101dc3784d42983eb6efe4f937ac735fbe5808898bf76334cdd290

  • SHA512

    a3f443c8bd210229024bbce1b8cdacd42d26c7234d9ea1a210948b3b55e1aa21ad311744c9a438f5eda6e2a3924a0d0c42ddab78f723ff072352e43dd48df1b8

  • SSDEEP

    3072:BbUL4+8zsVOIZ/rpMT66y0v8LNDZLuha5IUdrpjfWy9qK6PNWKvEoufZZn8X:Oy8lMtyW8LNlLuOIUTfWKqKuNrvEz+X

Malware Config

Targets

    • Target

      fb94b0a4ac7d7fff50a121024061222a_JaffaCakes118

    • Size

      169KB

    • MD5

      fb94b0a4ac7d7fff50a121024061222a

    • SHA1

      be03b847836f1ca452bafaac0c872ef34eabbb80

    • SHA256

      b6c63a936e101dc3784d42983eb6efe4f937ac735fbe5808898bf76334cdd290

    • SHA512

      a3f443c8bd210229024bbce1b8cdacd42d26c7234d9ea1a210948b3b55e1aa21ad311744c9a438f5eda6e2a3924a0d0c42ddab78f723ff072352e43dd48df1b8

    • SSDEEP

      3072:BbUL4+8zsVOIZ/rpMT66y0v8LNDZLuha5IUdrpjfWy9qK6PNWKvEoufZZn8X:Oy8lMtyW8LNlLuOIUTfWKqKuNrvEz+X

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks